Lightweight Blockchain Authentication Mechanism for Smart Home

被引:0
|
作者
Zhang Z.-J. [1 ,2 ]
Fan W. [1 ]
Zhu D.-L. [1 ]
机构
[1] Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing
来源
Ruan Jian Xue Bao/Journal of Software | 2022年 / 33卷 / 07期
关键词
blockchain; dynamic trusted lightweight authentication; smart home; zero-knowledge proof;
D O I
10.13328/j.cnki.jos.006288
中图分类号
学科分类号
摘要
The promotion of 5G provides new opportunities for the rapid development of the smart home industry, while the authentication issue of smart home systems has become a concern. The traditional centralized management and authentication methods adopted by smart home systems face centralized trust issues, and have the disadvantages of high performance overhead. Blockchain technology has become a research hotspot due to its advantages of decentralized and non-tampering features, providing new ideas for the realization of security certification for distributed smart home. Nevertheless, it also faces two challenges: the efficiency of user authentication with multiple distributed terminals and the leakage of user privacy. This study proposes a dynamic trusted lightweight authentication mechanism (DTL) based on blockchain. DTL uses consortium blockchain to build a blockchain system, which not only ensures that only authorized smart home sensor nodes can join the network, but also meets the needs of distributed security and scalability. DTL can achieve the following two advantages. (1) Aiming at the issue of authentication efficiency, by improving the consensus algorithm, a dynamic trusted sensor group (DTSG) authentication mechanism for smart homes is established, which avoids low access efficiency and low user access rate caused by one-to-one frequent authentication between the user and sensor terminal or gateway node. DTL has realized lightweight authentication. (2) For addressing the problem of user privacy protection, an authentication scheme combining DTSG mechanism and zero-knowledge proof is innovatively designed, which realizes user identity authentication without leaking user privacy. These security features are demonstrated by carrying out security analysis. Meanwhile, extensive simulations are conducted to validate the practicality and lightweight of DTL. © 2022 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:2699 / 2715
页数:16
相关论文
共 31 条
  • [1] Ukil A, Bandyopadhyay S, Pal A., IoT-privacy: To be private or not to be private, Proc. of the 2014 IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), pp. 123-124, (2014)
  • [2] Sun RL, Gong JB, Wang R, Zhang L, Cui L., Vehicle identification approach based on DSMT in WSN, Journal of Computer Research and Development, 47, (2010)
  • [3] Zhong X., The era of smart media: Privacy, security and ethics of smart homes—Taking EU GDPR and e-PrivacyDirective legislation as examples, TV Research, 340, 3, (2018)
  • [4] Sun JG, Wang JX, Yin GS, Wu XL., Overview of network situation awareness technology, Secrecy Science and Technology, 67, 4, (2016)
  • [5] Zhao K, Xing YH., Security survey of Internet of things driven by blockchain technology, Netinfo Security, 17, 5, (2017)
  • [6] Shen X, Pei QQ, Liu XF., Overview of blockchain technology, Journal of Network and Information Security, 2, 11, (2016)
  • [7] Brambilla G, Picone M, Amoretti M, Zanichelli F., An adaptive peer-to-peer overlay scheme for location-based services, Network Computing and Applications (NCA), 2, 1, (2014)
  • [8] Wang Y, Han GG, Li HZ., Provable security mobile user key exchange protocol for wireless communications, Netinfo Security, 15, 3, (2015)
  • [9] Gross H, Holbl M, Slamanig D., Privacy-aware authentication in the Internet of things, Proc. of the Int’l Conf. on Cryptology and Network Security, pp. 32-39, (2015)
  • [10] Skarmeta AF, Hernandez-Ramos JL, Moreno MV., A decentralized approach for security and privacy challenges in the Internet of things, Proc. of the 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 67-72, (2014)